Fig. 3From: Keeping pace with the creation of new malicious PDF files using an active-learning based detection frameworkExample of the conversion of a PDF file to a set of structural pathsBack to article page